Red Hat Security Advisory 2015-2534-01 – Apache Commons Collections is a library built upon Java JDK classes by providing new interfaces, implementations and utilities. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.
Monthly Archives: December 2015
Red Hat Security Advisory 2015-2535-01
Red Hat Security Advisory 2015-2535-01 – Red Hat JBoss Enterprise Application Platform 5 is a platform for Java applications based on JBoss Application Server 6. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.
RHEL 7.0 / 7.1 abrt / sosreport Local Root
Local root exploit for Redhat Enterprise Linux versions 7.0 and 7.1 that leverages abrt/sosreport.
CentOS 7.1 / Fedora 22 abrt Local Root
CentOS version 7.1 and Fedora version 22 abrt local root exploit. It leverages abrt-hook-ccpp insecure open() usage and abrt-action-install-debuginfo insecure temp directory usage.
Kodi 15 Arbitrary File Access
Kodi 15 reintroduced an arbitrary file access vulnerability.
Red Hat Security Advisory 2015-2525-01
Red Hat Security Advisory 2015-2525-01 – In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Update Support for Red Hat Enterprise Linux 6.5 was retired on November 30, 2015, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 6.5 EUS after November 30, 2015.
Ubuntu Security Notice USN-2819-1
Ubuntu Security Notice 2819-1 – Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, and Gary Kwong discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. Tyson Smith and David Keeler discovered a use-after-poison and buffer overflow in NSS. An attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. Various other issues were also addressed.
VoIP Wars: Destroying Jar Jar Lync
This archive includes presentation slides for the talk VoIP Wars: Destroying Jar Jar Lync along with the Viproxy tool used to perform the attack.
Huawei Wimax CSRF / Information Disclosure / Manipulation
Huawei Wimax routers suffer from cross site request forgery, information disclosure, and system manipulation vulnerabilities.
China APT Gang Targets Hong Kong Media via Dropbox
A Chinese APT gang is targeting Hong Kong media outlets with backdoors that connect to legitimate Dropbox accounts.